Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

Cryptography and Information Security in the Balkans

E-BookPDF1 - PDF WatermarkE-Book
207 Seiten
Englisch
Springer International Publishingerschienen am08.01.20161st ed. 2016
This book contains revised selected papers fromthe Second International Conference on Cryptology and Information Security inthe Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015.
The 12 papers presented inthis volume were carefully reviewed and selected from 27 submissions. They areorganized in topical sections named: symmetric key cryptography; cryptanalysis;security and protocols; and implementation and verifiable encryption.
mehr
Verfügbare Formate
BuchKartoniert, Paperback
EUR53,49
E-BookPDF1 - PDF WatermarkE-Book
EUR53,49

Produkt

KlappentextThis book contains revised selected papers fromthe Second International Conference on Cryptology and Information Security inthe Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015.
The 12 papers presented inthis volume were carefully reviewed and selected from 27 submissions. They areorganized in topical sections named: symmetric key cryptography; cryptanalysis;security and protocols; and implementation and verifiable encryption.
Details
Weitere ISBN/GTIN9783319291727
ProduktartE-Book
EinbandartE-Book
FormatPDF
Format Hinweis1 - PDF Watermark
FormatE107
Erscheinungsjahr2016
Erscheinungsdatum08.01.2016
Auflage1st ed. 2016
Reihen-Nr.9540
Seiten207 Seiten
SpracheEnglisch
IllustrationenVIII, 207 p. 19 illus.
Artikel-Nr.5847731
Rubriken
Genre9200

Inhalt/Kritik

Inhaltsverzeichnis
Symmetric key cryptography.- Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed-Muller Codes.- Results on characterizations of vectorial Bent and Plateaued Functions in arbitrary characteristic p.- Cryptographically Strong S-boxes Generated by Modified Immune Algorithm.- Cryptanalysis.- Analysis of the Authenticated Cipher MORUS.- LinearCryptanalysis and Modified DES with Embedded Parity Check in the S-boxes.- Time-Success Ratios under Simple Transformations: Analysis and Applications.- Security and protocols.- Synchronous Universally Composable Computer Networks.- Key-policy Attribute-based Encryption for General Boolean Circuits from Secret Sharing and Multi-linear Maps.- Closing the Gap: A Universal Privacy Framework for Outsourced Data.- Implementation and verifiable encryption.- On the Efficient Arithmetic for Lattice-Based Cryptography on GPU Using the CUDA Platform.- cuHE: A Homomorphic Encryption Accelerator Library.- Extended Functionalityin Verifiable Searchable Encryption.mehr